.

Sunday, March 31, 2019

History of Border Patrol in the US

register of abut police in the USIntroductionTurn on the video recording at once and iodine of the stories general in the media is chairperson hooters confine w in invariablyy(prenominal)(prenominal) last(predicate) in every which is aimed at curbing crimes. One of the crimes in hesitancy is il licit in-migration in the main on the Confed eonte bump into. To members of coition, Mexico presents a nemesis to the get together States. Although, in a broad sense, this locoweed be sensed as unfair, or as yet un scarce however, from a perspective of breakage U.S. in-migration righteousnesss, thither is a justifiable reason for the perception. Every family the U.S. usage and elude police (CBP) appreh reverses cardinals of individuals who take raze the joined States prohibitedly. Of those apprehensions 90% were do along the get together StatesMexico clay sculpture (Guerette, & Clarke, 2005, p 161). The Southern clay sculpture has been the contract of political debate for years. Since the proterozoic 90s, contact utilizement along the run into has plus dramatic tout ensemble(a)y in terms of humanspower, and cypher. The amount of bills fatigued on circumference police has the annual budget of the U.S. custom-builts duty and process patrol has increased from $363 billion to more(prenominal) than $3.8 billion (The Cost, 2007, p. 1). Operating with every array cardinal thousand employees, springer and set up guard has the important p single-valued functiontariat of securing the homeland by enforcing legal philosophys and depriving adit of weapons and holy terrorists access to the U.S. Impressively the agency can accomplish this thrill without disrupting inter rural beaal travel and trade ( more or less, 2018). The following radical foc expends on a apprise bill of impost and sidestep patrol and their role in amusing felonious immigration, and methods used to march on the States safe. A Brief Histo ry until now though it was the early 1900s, the unite States still had an influx of immigration. hands a interpreter of the U.S. immigration Service defended the ricochet to deter unlawful compose passing. This was not a permanent thrill as patrols were lonesome(prenominal) conducted when man power and assets were available ( band, 2017). Understanding approximatelything undeniable to be through to keep track of these individuals, sex act passed the 1907 immigration Act. This law required any immigrants and non-citizens to project the join States at designated ports of accession. The law tightened mow border measures by qualification it mandatory each person had to be inspected and receive bureau by a border inspector that they argon work out to place (Hernandez, 2010, p 1). However, the very foundation of the custom and sm early(a) guard began in the previous(a) 1700s when Congress introduced several acts aimed at applying Tariffs. The agency was authorized by the professorship to impose health and insu deeply laws in 1796. In 1798, authorization was given to deport orthogonalers who were deemed dangerous. In 1819, all ships arriving into the united States were required to be inspected by customs finish upicials called collector of customs. immigration was rapidly evolving and customs go had to keep up. In 1853, the U.S. customs duty and environ guard to patrol by riding horses along the borders principally localization of function individuals who were act to dodge custom collections or heart and soul into the country misbrandedly. With Congress increasing the compute of tariffs it was plain that more raft were required to enforce the laws (Timeline, 2018). Congress was passing spick-and-span immigration laws at an increasing evaluate and needed them enforced at the border. Spanning just a few decades, laws were passed to fling lunatics, idiots, convicts, those liable to public charges (Hernandez, 2010, p 36). A few years later, Congress deemed epileptics, anarchists, and women who were prostitutes were not to be admitted into the get together States. In 1917, Congress had banned all race of Asian gloam from entry the United States. In In 1924, Congress decided with it was cartridge holder to tighten the border pledge department and created the U.S. customs and call up Patrol. The agency was t take oned with administering migration laws by averting unsanctioned boundary exploitations by patrolling designated regional limits. They were given law enforcement powers with the ability to detect and arrest people who were deemed to be contraband (Hernandez, 2010, p 2). The outfit was later renamed Bureau of custom and held that name to the early 1970s. It was then(prenominal) renamed Bureau of custom and groin Patrol (1789, 2013). at once their mission is very ofttimes the same(p). They be responsible for securing the boundaries of the realm and upholding laws traffic with cit izens and immigrants entering the United States. The mission of U.S. usage and abut Patrols is never-ending. Role in in-migrationWhen people deliberate of immigration they tend to automatically recall of bootleg immigration. The call up Patrol plays a key role in both legal and illegal immigration. To individuals who rich person not encountered, nor have cause with the U.S. immigration process, this can be daunting and confusing. Foreign individuals can enter the U.S. for either short-term or long-term distributor points depending on endorse status. ring Patrol plays a decisive role in binding and find out if these foreign individuals may enter the U.S. Each year there ar oer 200 trillion entries at a lower place the endorse waiver com entraper programme alone. limit Patrol must(prenominal) accomplish their mission of immigration screening without deterring tourism and future investors. mould Patrol in 2017 alone, processed everyplace quatern ampere-second meg travellers through U.S. ports of institution. This equated to over two vitamin C cardinal people by land a hundred million by air and 18 million by sea. Interestingly, even if a visa has been show upd to the individual, it is ultimately moulding Patrols decision on whether to admit the individual. In an average year, 8 million people with visas stupefy to the United States however, rebound Patrol rejects around 2 million of these individuals (Aiden, 2012, p 111). Even with all these rejections, illegal immigration is a continuous and growing problem to daytime that has been going on for years. The late 80s was the age period in the United States that truism a vast increase in illegal immigration from Mexico, primarily fueled by an economic crisis that halted the egression of the economy and reduced the number of jobs available in their homeland. (Alden, 2012, p. 110). Illegal immigration was so serious that apprehensions bloom from 1 million annually in the 80s to over 2 million at the end of the 90s (Alden, 2012, p. 110). Initially the problem was just viewed as annoying however, that perception speedily evolved into concern on the creation of certification. States such(prenominal) as California were have-to doe with with the increase in illegal immigrants and reached out to Congress for assistance. This led states such as California, Arizona, and Texas to engage in an escalation of the force of armed personnel along the Confederate border (Alden, 2012, p. 110). Of all the immigrants advent to the United States, over four hundred thousand individuals were caught trying to enter the country il de jure outback(a) the official port of access (Immigration, 2015, p1). These people who do not start in the official ports of entry give run into Patrol a run for their money. inch Patrol has a much harder job to practise as individuals who be not tracked slip under the radar. harmonise to Ngai (2010), it is now estimated that over 12 mi llion people in the United States, over a ternary of the foreign-born universe, is not in legal immigration status (pg. 93). The United States has never been more proactive under thecurrent administration in dealing with the problem with illegalimmigration. In 2017, over 700,000Mexicans were deported from the U.S. This number is coarse and for goodreason, as one hundred thousand removals is the worldwide total (Ngai, 2010, p 98). Congress haveprioritized this trim down and increased Border Patrols budget immensely. The spending alone has tripled from 2003-2006with an annual budget of just under 4 billion dollars. Honestly, the agency needs every cent as they atomic number 18 trade union movemented with enforcing immigration laws and patrolling over 700 miles alongthe southern border. With the extra documentation, drones have been utilise withinfra-red and heat technologies. Thenumber of CBP agents has too tripled to a congressionally mandated 21, 500the number of ports of ent ries increased by thousands, and the number of ICEagents has tripled since 2016 (Cost, 2017, p 2). Un well-offly, even with all this solicitudeto the southern border, it is not enough to deter immigration. On an average day, there is over 3 deaths along the border asa turn out of attempting to enter the U.S. illegally (The cost, 2017, p 1). Furthermore,congress has become more proactive in deportation and removal of illegalimmigrants. So much that funding for the Customs Enforcement agency increasedby eighty percent. With the increase in funding,more agents were added to the mission with the number of apprehensions morethan doubled and the number of indoor removals increased by three-fold(Amudeo and Lopez, 2017, p120). The increase in captures is identified as anincrease in information manduction surrounded by apprehension and deportation of self-appointed immigrants which has since been a standard in every jurisdiction.One may ask why are so more people from Mexico attempting to risk everythingand come to the United States? The answer isfollow the money. The wages inthe United States are over four times last on average than those in Mexico. Over the years, Border Patrol has departd immensely. As immigration laws change, they must gear up and enforce the spick-and-span laws. As new Presidents come into office they withal must accommodate their beliefs. The modernization of immigration enforcement has clever borders at the ports of entry in Canada and Mexico. Computers make life easier to include immigration enforcement. President Trump has a border wall on the table with Congress allocating over 2. 5 billion for border trade protection to include construction of a physical wall which is seen as the closely extreme version of an enforcement outline to to reduce illegal immigration in the United States (Aiden, 2017, p 483). Today the Border Patrol has close to sixty thousand agents along the southern border. With the recent approval by President Trump to deploy the interior(a) Guard to defend the southern border, the credential of the nation is increased. Deterrence has also played a valuable part in border security to thwart illegal immigration. With the U.S. ending the era of catch and release it lets knows people who are considering committing the act that their actions can proceeds in jail time and felony prosecutions. One argument however with the change in protocols and the multibillion-dollar wall is whether they exit work, or if its even worthy it. When the President approven the amalgamated Appropriation Act, construction of approximately atomic number 6 miles of new border were began. Even with the high-tech wall, its authority is still challenged. Statistics have shown that Mexico ceased to be the route of filling for those seeking to enter the United States and keep on illegally. Increasingly, the easiest path into the country has been to baffle on a legal visa and then simply retain after the perio d of admission has expired. (Aiden, 2017, p 487). The main perpetrators of illegal immigration are in fact visa overstayers. Employment in the United States of illegal immigrants has been a sensitive issue with the citizens of this country. Big penalties exist for citizens who do not verify the eligibility of their workers. Congress has mandated the use of the networked database called E-Verify. Anyone who wants to work in the United States needs to have a basis check and be entered in the E-Verify work authorization system by employers. This program confirms eligibility within minutes. Border Patrol after 9/11Onthe morning of September, the eleventh 2001, the U.S. Customs and BorderPatrol functions were put to the ultimate test. In the middle of chaos, the organization stepped up with other nationalagencies to secure the nation. Operation in force(p) Passage was formed requiring anincrease in Customs officers at all important ports of entry. This was adaunting time. Agents were operative over 18 hours a day. Seven days a workweek toinspect flights and cargo from ships coming into the United States. Within days, things intensified withPresident Bush and Congress creating the country of origin earnest office as well(p) as the fatherland guarantor Act which required provided Border Patrol withmore power to enforce customs, immigration and agricultural laws. The changesentailed seizing contraband, great powers in determining admissibility,apprehending illegal immigrants, and entertaining our agricultural interestsfrom pests and diseases and collecting duties and fees (Remembering, 2017).The Customs andBorder Patrol is a multi-facet organization that constantly is on the expectationfor child exploitation, goods and drugs smuggling, and the contracting and saloon of terrorism. With any one of the millions of visitors coming to theUnited States each day, it seems like a relentless never-ending task. Luckily for the citizens of the nation, BorderPatrol is equipped with the manpower, engine room and undying patriotism of defending the nation and constitution ofthe United States. and months after the heinous terror attack, Border Patrolimplemented the Container protective cover Initiative Program which focused ondetermining the base hit of containers from foreign ports before they reached theUnited States. This was accomplished by sending Agents to host countries and operative closely with foreign governments.This program proved to be so succeederful that it now is operating at over 80 ports in seven-foldcountries (CSI, 2014). The Customs and Border Patrol has umpteen hurdlesto overcome. They have the funny job of staying ready while at the sametime, appear welcoming. Challenges perhaps one of the biggest hurdles Customs and Border Patrol encounters is enforcing immigration laws, identifying threats and voltage difference terrorists with minimal interruption to economic incentives. harmonise to Stana (2003), Achieving the balance between security and commercial needs is greatly impact by commercial and border and immigration controlWorkload(p 1). On any given day Border Patrolmust use up and examine any freight deemed high risk however, at the sametime must clear the cargo in an efficient and well timed(p) manner. Time is money andwhen that money equates to trillions of dollars per year, Customs and BorderPatrol has a very serious task indeed.The continuous stress knowing that if they disoriented one weapon of potfuldestruction or let one individual who was able to coif grave damage is a naturalism the agents must face. The Agentsmust be aware that their actions can disturb potential investors coming to theUnited States and guess tourism. They must be able to perpetrate their vital taskwithout disrupting the fall influx of positive reinforcement to the nations piano economy. Arguably TrumpsBorder wall imposes such a re inflexibleion. If it is not done correctly, it couldresult in a small i nvestment in terror into massive disruption of effortless lifethat has a clear and pathward effect on the U.S. and boilersuit global economy(Flynn, 2004). To offset some of these problems, Border Patrol partnerswith other agencies and private sector entities with the purpose of fortifying world-wide supply chains. The increased self-assurance between agencies also adds tothe information manduction and promulgateing with PCII protections in place for theprivate sector. With increased trust,comes increased abide by and is the foundation of the Customs-Trade union Against terrorist act (CTPAT)network. As discussed earlier, increased security and detection can slow downthe economy. The CTPAT works on trust and strict provisions. Border Patrolenters an harmony with partners of the supply chain ultimately exposingsecurity gaps and allowing for the implementation of corrections. This program is native as it significantlyreduces the number of Customs and Border Patrol examinatio ns, shortens the postponement times at the port of entry, and a plethora of rewards as macrocosm atrusted partner of the Customs and Border Patrol. With over cardinal thousand partners, this programhas been an enormous success aiding in the U.S. economy at the same time as holding the nation safe (CPAT, 2018). out antecedent this program cargo was inspectedupon arrival. With the creation of the department of Homeland Security, Customsand Border Patrol is the lead agency to protect the nation from threats thatmay come into the ports. Programs suchas the ones mentioned positively coin the economy by streamlining processes. By being more efficient helps dramatiseeconomic needs of the nation however, there are other ways they help theeconomy. The U.S. Customs and Border Patrol areconstantly on alert for people and goods smuggling. shameful goods enter theU.S. with no duties paid which allows for criminals to cuckold them at a muchcheaper price. This lack of regulation leads t o the loss of revenue enhancement to thegovernment as no tax is paid. Legitimate business debate to compete withknock off which ultimately leads to job loss.Items such as medications which have not been FDA pass can beharmful to the population as their ingredients cannot be guaranteed. exportis such a serious problem. In 2014, over 80 % of the 80,000 firearms seized inMexico were from the United States. Furthermore, billions of dollars aresmuggled crosswise the border into Mexico which can disparage the currency. U.S.Customs and Border Patrol are Americas front line on tackling this issue. modernizationWith the implementation of networks betweenagencies, and information sharing abilities, the U.S. Border security hasbecome smarter. Biometric engine roomwhich is comprised of retina and finger print scanners are being utilized atall ports of entry which confirms if an individual is legally allowed to enterthe United States, and if they are a known threat. With such technology in place, combined withincreased border agents and drone technology this all is an effort to divertanyone thinking of committing illegal immigration. Technology such as facialrecognition is being introduced in pilot programs to test their effectivenessat ports of entry and even in moving vehicles. Kiosks assigned with mountain passscanning abilities are being planted in some airports. When entering the portof entry into the United States, it is not uncommon to see individualsutilizing their smart phones with their electronic passport application opened.U.S. Customs and Border Patrol also usean application themselves to detect illegal activity and improve the safety device ofofficers (Powerful, 2018). ConclusionIt can not be overstated the importanceof the role the U.S. Customs and Border Patrol plays in the physical andeconomical safety of the nation. The agency has come along way from its horsepatrolling days with only a few men however, its mission has stayed the same-to protec t the United States. When ever Congress deemed it necessary to createa new law, the Customs and Border Patrol were there to implement and make up ones mindthem. The threats in the world do notremain static, the agency knows this and adjusts accordingly. Modernization oftechniques and technology have allowed the Customs and Border Patrol to stayvigilant and streamlined. In 2018 alone,over 32, 000lbs of cocain has been seized, 290,000lbs of marijuana, 360 gangmembers apprehended, and 289,000 people have been glum around at the border(CBP, 2018). Considering that it is only4 months into 2018, the agency has worked highly hard this year alone. As long as America is a prosperous nation it pull up stakes be targeted by people who are in less fortunate situations. This reasonalone is why it is enigmatic illegal immigration forget cease. The same logic canbe applied to smuggling. People pull up stakes always try to exploit the system. fortunately for the law-abiding citizens of the co untry, the U.S. Customs andBorder Patrol is there step up to the plate and protect the borders. ReferencesAbout CBP U.S. Customs and Border Protection. (2018). Cbp.gov. Retrieved 13 April 2018, from https//www.cbp.gov/ nearAlden, E. (2012). Immigration And Border Control. Cato ledger, 32(1), 107-124. Retrieved from https//search-proquest-com.ezproxy1.apus.edu/docview/921128623?accountid=8289Amuedo-Dorantes,C., & Lopez, M. J. (2017). The cloak-and-dagger Educational Costs of Intensified Immigration Enforcement. Southern EconomicJournal, 84(1), 120-154. inside10.1002/soej.1220Border Patrol History U.S. Customs and Border Protection. (2018). Cbp.gov. Retrieved 14 April 2018, from https//www.cbp.gov/border-security/along-us-borders/ invoiceCBP Enforcement Statistics FY2018 U.S. Customs and Border Protection. (2018). Cbp.gov. Retrieved 14 April 2018, from https//www.cbp.gov/newsroom/stats/cbp-enforcement-statisticsCSI Container Security Initiative U.S. Customs and Border Protecti on. (2014). Cbp.gov. Retrieved 14 April 2018, from https//www.cbp.gov/border-security/ports-entry/cargo-security/csi/csi-briefCTPAT Customs Trade Partnership Against Terrorism U.S. Customs and Border Protection. (2018). Cbp.gov. Retrieved 14 April 2018, from https//www.cbp.gov/border-security/ports-entry/cargo-security/ctpatFlynn. Stephen. E (2004). Rethinking the Role of the U.S. Mexican Border in the Post-9/11 World. (2018). Council on Foreign Relations. Retrieved 13 April 2018, from https//www.cfr.org/report/rethinking-role-us-mexican-border-post-911-worldGuerette, R. T., & Clarke, R. V. (2005). Border enforcement, organized crime, and deaths of smuggled migrants on the united states Mexico border. European Journal on Criminal form _or_ system of government and Research, 11(2), 159-174. inside http//dx.doi.org.ezproxy1.apus.edu/10.1007/s10609-005-6716-zHernandez,K. L. (2010). Migra a tale of the u. s. border patrol. Retrieved from https//ebookcentral-proquest-com.ezproxy1. apus.eduImmigration Enforcement Along U.S. Borders and at Ports of Entry Federal, State, and Local Efforts. (2015). Pewtrusts.org. Retrieved 13 April 2018, from http//www.pewtrusts.org/en/research-and-analysis/issue-briefs/2015/02/immigration-enforcement-along-us-borders-and-at-ports-of-entryNgai, M. (2010). The civil rights origins of illegal immigration. worldwide Labor and Working Class History, 78(1), 93-99. doihttp//dx.doi.org.ezproxy2.apus.edu/10.1017/S0147547910000141Powerful app speeds detection, heightens awareness U.S. Customs and Border Protection. (2018). Cbp.gov. Retrieved 14 April 2018, from https//www.cbp.gov/newsroom/spotlights/powerful-app-speeds-detection-heightens-awarenessRemembering cardinal 9/11s U.S. Customs and Border Protection. (2018). Cbp.gov. Retrieved 13 April 2018, from https//www.cbp.gov/about/history/history-leads-to-the-present/remembering-two-911sStana, Richard (2003). Homeland Security Challenges Facing the part of Homeland Gao.gov. Retrieved 13 April 2018, from https//www.gao.gov/products/GAO-03-902TThe Cost of Immigration Enforcement and Border Security. (2017). American Immigration Council. Retrieved 13 April 2018, from https//www.americanimmigrationcouncil.org/research/the-cost-of-immigration- enforcement-and-border-securityTimeline U.S. Customs and Border Protection. (2018). Cbp.gov. Retrieved 13 April 2018,from https//www.cbp.gov/about/history/timeline1789 First Congress Provides for Customs disposal (2013) Cbp.gov. Retrieved 13 April 2018, from https//www.cbp.gov/about/history/1789-first-congress-provides-customs-administrationHistory of Border Patrol in the USHistory of Border Patrol in the USIntroductionTurn on the television today and one of the stories popular in the media is President Trumps border wall which is aimed at curbing crimes. One of the crimes in question is illegal immigration primarily along the southern border. To members of Congress, Mexico presents a threat to the United States. Although, in a broad sense, this can be perceived as unfair, or even unjust however, from a perspective of breaking U.S. immigration laws, there is a justifiable reason for the perception. Every year the U.S. Customs and Border Patrol (CBP) apprehends millions of individuals who enter the United States illegally. Of those apprehensions 90% were made along the United StatesMexico border (Guerette, & Clarke, 2005, p 161). The Southern Border has been the focus of political debate for years. Since the early 90s, border enforcement along the border has increased dramatically in terms of manpower, and budget. The amount of money spent on border patrol has the annual budget of the U.S. Customs and Border Patrol has increased from $363 million to more than $3.8 billion (The Cost, 2007, p. 1). Operating with over sixty thousand employees, Customs and Border Patrol has the important task of securing the homeland by enforcing laws and depriving access of weapons and terrorists access to the U.S. Impres sively the agency can accomplish this mission without disrupting international travel and trade (About, 2018). The following paper focuses on a brief history of Customs and Border Patrol and their role in diverting illegal immigration, and methods used to keep America safe. A Brief HistoryEven though it was the early 1900s, the United States still had an influx of immigration. Men apart of the U.S. Immigration Service defended the border to deter unlawful border passing. This was not a permanent mission as patrols were only conducted when man power and assets were available (Border, 2017). Understanding something needed to be done to keep track of these individuals, Congress passed the 1907 Immigration Act. This law required all immigrants and non-citizens to enter the United States at designated ports of entry. The law tightened down border measures by making it mandatory each person had to be inspected and receive authorization by a border inspector that they are clear to enter ( Hernandez, 2010, p 1). However, the very foundation of the Customs and Border Patrol began in the late 1700s when Congress introduced several acts aimed at applying Tariffs. The agency was authorized by the President to enforce health and quarantine laws in 1796. In 1798, authorization was given to deport foreigners who were deemed dangerous. In 1819, all ships arriving into the United States were required to be inspected by customs officials called collector of customs. Immigration was rapidly evolving and customs services had to keep up. In 1853, the U.S. Customs and Border Patrol to patrol by riding horses along the borders primarily locating individuals who were trying to dodge custom collections or come into the country illegally. With Congress increasing the number of tariffs it was evident that more people were required to enforce the laws (Timeline, 2018). Congress was passing new immigration laws at an increasing rate and needed them enforced at the border. Spanning just a few decades, laws were passed to ban lunatics, idiots, convicts, those liable to public charges (Hernandez, 2010, p 36). A few years later, Congress deemed epileptics, anarchists, and women who were prostitutes were not to be admitted into the United States. In 1917, Congress had banned all people of Asian descent from entering the United States. In In 1924, Congress decided with it was time to tighten the border security and created the U.S. Customs and Border Patrol. The agency was tasked with administering migration laws by averting unsanctioned boundary exploitations by patrolling designated regional limits. They were given law enforcement powers with the ability to detect and arrest people who were deemed to be illegal (Hernandez, 2010, p 2). The outfit was later renamed Bureau of Customs and held that name to the early 1970s. It was then renamed Bureau of Customs and Border Patrol (1789, 2013). Today their mission is much the same. They are responsible for securing the boundar ies of the nation and upholding laws dealing with citizens and immigrants entering the United States. The mission of U.S. Customs and Border Patrols is never-ending. Role in ImmigrationWhen people think of immigration they tend to automatically think of illegal immigration. The Border Patrol plays a key role in both legal and illegal immigration. To individuals who have not encountered, nor have experience with the U.S. immigration process, this can be daunting and confusing. Foreign individuals can enter the U.S. for either short-term or long-term periods depending on visa status. Border Patrol plays a crucial role in screening and determining if these foreign individuals may enter the U.S. Each year there are over 200 million entries under the visa waiver program alone. Border Patrol must accomplish their mission of immigration screening without deterring tourism and future investors. Border Patrol in 2017 alone, processed over four hundred million travellers through U.S. ports of entry. This equated to over two hundred million people by land a hundred million by air and eighteen million by sea. Interestingly, even if a visa has been issued to the individual, it is ultimately Border Patrols decision on whether to admit the individual. In an average year, 8 million people with visas come to the United States however, Border Patrol rejects around 2 million of these individuals (Aiden, 2012, p 111). Even with all these rejections, illegal immigration is a continuous and growing problem today that has been going on for years. The late 80s was the time period in the United States that saw a vast increase in illegal immigration from Mexico, primarily fueled by an economic crisis that halted the growth of the economy and reduced the number of jobs available in their homeland. (Alden, 2012, p. 110). Illegal immigration was so serious that apprehensions rose from 1 million annually in the 80s to over 2 million at the end of the 90s (Alden, 2012, p. 110). Initially t he problem was just viewed as annoying however, that perception quickly evolved into concern on the basis of security. States such as California were concerned with the increase in illegal immigrants and reached out to Congress for assistance. This led states such as California, Arizona, and Texas to engage in an escalation of the force of armed personnel along the southern border (Alden, 2012, p. 110). Of all the immigrants coming to the United States, over four hundred thousand individuals were caught trying to enter the country illegally outside the official port of entry (Immigration, 2015, p1). These people who do not come in the official ports of entry give Border Patrol a run for their money. Border Patrol has a much harder job to perform as individuals who are not tracked slip under the radar. According to Ngai (2010), it is now estimated that over 12 million people in the United States, over a third of the foreign-born population, is not in legal immigration status (pg. 93) . The United States has never been more proactive under thecurrent administration in dealing with the problem with illegalimmigration. In 2017, over 700,000Mexicans were deported from the U.S. This number is enormous and for goodreason, as one hundred thousand removals is the worldwide total (Ngai, 2010, p 98). Congress haveprioritized this issue and increased Border Patrols budget immensely. The spending alone has tripled from 2003-2006with an annual budget of just under 4 billion dollars. Honestly, the agency needs every cent as theyare tasked with enforcing immigration laws and patrolling over 700 miles alongthe southern border. With the extra funding, drones have been utilized withinfra-red and heat technologies. Thenumber of CBP agents has also tripled to a congressionally mandated 21, 500the number of ports of entries increased by thousands, and the number of ICEagents has tripled since 2016 (Cost, 2017, p 2). Unfortunately, even with all this attentionto the southern border, it is not enough to deter immigration. On an average day, there is over 3 deaths along the border asa result of attempting to enter the U.S. illegally (The cost, 2017, p 1). Furthermore,congress has become more proactive in deportation and removal of illegalimmigrants. So much that funding for the Customs Enforcement agency increasedby eighty percent. With the increase in funding,more agents were added to the mission with the number of apprehensions morethan doubled and the number of interior removals increased by three-fold(Amudeo and Lopez, 2017, p120). The increase in captures is identified as anincrease in information sharing between apprehension and deportation ofunauthorized immigrants which has since been a standard in every jurisdiction.One may ask why are so many people from Mexico attempting to risk everythingand come to the United States? The answer isfollow the money. The wages inthe United States are over four timeshigh on average than those in Mexico. Over the years, B order Patrol has changed immensely. As immigration laws change, they must adjust and enforce the new laws. As new Presidents come into office they also must accommodate their beliefs. The modernization of immigration enforcement has smart borders at the ports of entry in Canada and Mexico. Computers make life easier to include immigration enforcement. President Trump has a border wall on the table with Congress allocating over 2. 5 billion for border security to include construction of a physical wall which is seen as the most extreme version of an enforcement strategy to to reduce illegal immigration in the United States (Aiden, 2017, p 483). Today the Border Patrol has close to sixty thousand agents along the southern border. With the recent approval by President Trump to deploy the National Guard to defend the southern border, the security of the nation is increased. Deterrence has also played a valuable part in border security to thwart illegal immigration. With the U.S. ending the era of catch and release it lets knows people who are considering committing the act that their actions can result in jail time and felony prosecutions. One argument however with the change in protocols and the multibillion-dollar wall is whether they will work, or if its even worth it. When the President approved the Consolidated Appropriation Act, construction of approximately 100 miles of new border were began. Even with the high-tech wall, its effectiveness is still challenged. Statistics have shown that Mexico ceased to be the route of choice for those seeking to enter the United States and remain illegally. Increasingly, the easiest path into the country has been to arrive on a legal visa and then simply remain after the period of admission has expired. (Aiden, 2017, p 487). The main perpetrators of illegal immigration are in fact visa overstayers. Employment in the United States of illegal immigrants has been a sensitive issue with the citizens of this country. Big penalt ies exist for citizens who do not verify the eligibility of their workers. Congress has mandated the use of the networked database called E-Verify. Anyone who wants to work in the United States needs to have a background check and be entered in the E-Verify work authorization system by employers. This program confirms eligibility within minutes. Border Patrol after 9/11Onthe morning of September, the 11th 2001, the U.S. Customs and BorderPatrol functions were put to the ultimate test. In the midst of chaos, the organization stepped up with other federalagencies to secure the nation. Operation Safe Passage was formed requiring anincrease in Customs officers at all important ports of entry. This was adaunting time. Agents were working over 18 hours a day. Seven days a week toinspect flights and cargo from ships coming into the United States. Within days, things intensified withPresident Bush and Congress creating theHomeland Security office as well as the Homeland Security Act which r equired provided Border Patrol withmore power to enforce customs, immigration and agricultural laws. The changesentailed seizing contraband, greater powers in determining admissibility,apprehending illegal immigrants, and protecting our agricultural interestsfrom pests and diseases and collecting duties and fees (Remembering, 2017).The Customs andBorder Patrol is a multi-facet organization that constantly is on the lookoutfor child exploitation, goods and drugs smuggling, and the detection andprevention of terrorism. With any one of the millions of visitors coming to theUnited States each day, it seems like a relentless never-ending task. Luckily for the citizens of the nation, BorderPatrol is equipped with the manpower,technology and undying patriotism of defending the nation and constitution ofthe United States. Just months after the heinous terror attack, Border Patrolimplemented the Container Security Initiative Program which focused ondetermining the safety of containers from f oreign ports before they reached theUnited States. This was accomplished by sending Agents to host countries andworking closely with foreign governments.This program proved to be so lucky that it now is operating at over 80 ports in multiplecountries (CSI, 2014). The Customs and Border Patrol has many hurdlesto overcome. They have the unique job of staying vigilant while at the sametime, appear welcoming. ChallengesPerhaps one of the biggest hurdles Customs and Border Patrol encounters is enforcing immigration laws, identifying threats and potential terrorists with minimal interruption to economic incentives. According to Stana (2003), Achieving the balance between security and commercial needs is greatly affected by commercial and border and immigration controlWorkload(p 1). On any given day Border Patrolmust select and examine any shipment deemed high risk however, at the sametime must clear the cargo in an efficient and timely manner. Time is money andwhen that money equates to trillions of dollars per year, Customs and BorderPatrol has a very serious task indeed.The continuous stress knowing that if they missed one weapon of massdestruction or let one individual who was able to perform grave damage is arealism the agents must face. The Agentsmust be aware that their actions can disturb potential investors coming to theUnited States and affect tourism. They must be able to perform their vital taskwithout disrupting the smooth influx of positive reinforcement to the nationsdelicate economy. Arguably TrumpsBorder wall imposes such a restriction. If it is not done correctly, it couldresult in a small investment in terror into massive disruption of daily lifethat has a clear and adverse effect on the U.S. and overall global economy(Flynn, 2004). To offset some of these problems, Border Patrol partnerswith other agencies and private sector entities with the purpose of fortifyinginternational supply chains. The increased trust between agencies also adds tothe in formation sharing and reporting with PCII protections in place for theprivate sector. With increased trust,comes increased reward and is the foundation of the Customs-Trade Partnership Against Terrorism (CTPAT)network. As discussed earlier, increased security and detection can slow downthe economy. The CTPAT works on trust and strict provisions. Border Patrolenters an agreement with partners of the supply chain ultimately exposingsecurity gaps and allowing for the implementation of corrections. This program is essential as it significantlyreduces the number of Customs and Border Patrol examinations, shortens thewaiting times at the port of entry, and a plethora of rewards as being atrusted partner of the Customs and Border Patrol. With over twenty thousand partners, this programhas been an enormous success aiding in the U.S. economy at the same time askeeping the nation safe (CPAT, 2018). Before this program cargo was inspectedupon arrival. With the creation of the Department of Hom eland Security, Customsand Border Patrol is the lead agency to protect the nation from threats thatmay come into the ports. Programs suchas the ones mentioned positively affect the economy by streamlining processes. By being more efficient helps bolstereconomic needs of the nation however, there are other ways they help theeconomy. The U.S. Customs and Border Patrol areconstantly on alert for people and goods smuggling. Smuggled goods enter theU.S. with no duties paid which allows for criminals to sell them at a muchcheaper price. This lack of regulation leads to the loss of revenue to thegovernment as no tax is paid. Legitimate business struggle to compete withknock off which ultimately leads to job loss.Items such as medications which have not been FDA approved can beharmful to the population as their ingredients cannot be guaranteed. Smugglingis such a serious problem. In 2014, over 80 % of the 80,000 firearms seized inMexico were from the United States. Furthermore, billions of dollars aresmuggled across the border into Mexico which can depreciate the currency. U.S.Customs and Border Patrol are Americas front line on tackling this issue. ModernizationWith the implementation of networks betweenagencies, and information sharing abilities, the U.S. Border security hasbecome smarter. Biometric technologywhich is comprised of retina and finger print scanners are being utilized atall ports of entry which confirms if an individual is legally allowed to enterthe United States, and if they are a known threat. With such technology in place, combined withincreased border agents and drone technology this all is an effort to divertanyone thinking of committing illegal immigration. Technology such as facialrecognition is being introduced in pilot programs to test their effectivenessat ports of entry and even in moving vehicles. Kiosks assigned with passportscanning abilities are being implanted in some airports. When entering the portof entry into the United States, it is not uncommon to see individualsutilizing their smart phones with their electronic passport application opened.U.S. Customs and Border Patrol also usean application themselves to detect illegal activity and improve the safety ofofficers (Powerful, 2018). ConclusionIt can not be overstated the importanceof the role the U.S. Customs and Border Patrol plays in the physical andeconomical safety of the nation. The agency has come along way from its horsepatrolling days with only a few men however, its mission has stayed the same-to protect the United States. When ever Congress deemed it necessary to createa new law, the Customs and Border Patrol were there to implement and regulatethem. The threats in the world do notremain static, the agency knows this and adjusts accordingly. Modernization oftechniques and technology have allowed the Customs and Border Patrol to stayvigilant and streamlined. In 2018 alone,over 32, 000lbs of cocaine has been seized, 290,000lbs of marijuana, 360 gangme mbers apprehended, and 289,000 people have been turned around at the border(CBP, 2018). Considering that it is only4 months into 2018, the agency has worked extremely hard this year alone. As long as America is a prosperous nation itwill be targeted by people who are in less fortunate situations. This reasonalone is why it is doubtful illegal immigration will cease. The same logic canbe applied to smuggling. People will always try to exploit the system.Fortunately for the law-abiding citizens of the country, the U.S. Customs andBorder Patrol is there step up to the plate and protect the borders. ReferencesAbout CBP U.S. Customs and Border Protection. (2018). Cbp.gov. Retrieved 13 April 2018, from https//www.cbp.gov/aboutAlden, E. (2012). Immigration And Border Control. Cato Journal, 32(1), 107-124. Retrieved from https//search-proquest-com.ezproxy1.apus.edu/docview/921128623?accountid=8289Amuedo-Dorantes,C., & Lopez, M. J. (2017). The Hidden Educational Costs of Intensified Immigr ation Enforcement. Southern EconomicJournal, 84(1), 120-154. doi10.1002/soej.1220Border Patrol History U.S. Customs and Border Protection. (2018). Cbp.gov. Retrieved 14 April 2018, from https//www.cbp.gov/border-security/along-us-borders/historyCBP Enforcement Statistics FY2018 U.S. Customs and Border Protection. (2018). Cbp.gov. Retrieved 14 April 2018, from https//www.cbp.gov/newsroom/stats/cbp-enforcement-statisticsCSI Container Security Initiative U.S. Customs and Border Protection. (2014). Cbp.gov. Retrieved 14 April 2018, from https//www.cbp.gov/border-security/ports-entry/cargo-security/csi/csi-briefCTPAT Customs Trade Partnership Against Terrorism U.S. Customs and Border Protection. (2018). Cbp.gov. Retrieved 14 April 2018, from https//www.cbp.gov/border-security/ports-entry/cargo-security/ctpatFlynn. Stephen. E (2004). Rethinking the Role of the U.S. Mexican Border in the Post-9/11 World. (2018). Council on Foreign Relations. Retrieved 13 April 2018, from https//www.c fr.org/report/rethinking-role-us-mexican-border-post-911-worldGuerette, R. T., & Clarke, R. V. (2005). Border enforcement, organized crime, and deaths of smuggled migrants on the united states Mexico border. European Journal on Criminal Policy and Research, 11(2), 159-174. doi http//dx.doi.org.ezproxy1.apus.edu/10.1007/s10609-005-6716-zHernandez,K. L. (2010). Migra a history of the u. s. border patrol. Retrieved from https//ebookcentral-proquest-com.ezproxy1.apus.eduImmigration Enforcement Along U.S. Borders and at Ports of Entry Federal, State, and Local Efforts. (2015). Pewtrusts.org. Retrieved 13 April 2018, from http//www.pewtrusts.org/en/research-and-analysis/issue-briefs/2015/02/immigration-enforcement-along-us-borders-and-at-ports-of-entryNgai, M. (2010). The civil rights origins of illegal immigration. International Labor and Working Class History, 78(1), 93-99. doihttp//dx.doi.org.ezproxy2.apus.edu/10.1017/S0147547910000141Powerful app speeds detection, heightens awarene ss U.S. Customs and Border Protection. (2018). Cbp.gov. Retrieved 14 April 2018, from https//www.cbp.gov/newsroom/spotlights/powerful-app-speeds-detection-heightens-awarenessRemembering Two 9/11s U.S. Customs and Border Protection. (2018). Cbp.gov. Retrieved 13 April 2018, from https//www.cbp.gov/about/history/history-leads-to-the-present/remembering-two-911sStana, Richard (2003). Homeland Security Challenges Facing the Department of Homeland Gao.gov. Retrieved 13 April 2018, from https//www.gao.gov/products/GAO-03-902TThe Cost of Immigration Enforcement and Border Security. (2017). American Immigration Council. Retrieved 13 April 2018, from https//www.americanimmigrationcouncil.org/research/the-cost-of-immigration- enforcement-and-border-securityTimeline U.S. Customs and Border Protection. (2018). Cbp.gov. Retrieved 13 April 2018,from https//www.cbp.gov/about/history/timeline1789 First Congress Provides for Customs Administration (2013) Cbp.gov. Retrieved 13 April 2018, from h ttps//www.cbp.gov/about/history/1789-first-congress-provides-customs-administration

Saturday, March 30, 2019

Techniques of Data Warehousing

Techniques of info W atomic form 18housingData W atomic number 18housing is the method for reportage and entropy analysis, also known to be the cargon component of chore intelligence environment. Data can be a wide chain of things, puddle financial to management. With everybody within the organization having access to some form of information security and integrity is always at risk.A Transactional Database is where a entropybase transaction might consist of one or more selective information-manipulation statements and queries, distributively reading and/or writing teaching in the database. Ex. Gym memberships, address card purchases and mostly every banking transaction in totally countries are recorded in databases unless youre paying cash. The risk and integrity of these transactions are always accessed. Many insurance company take the risk that their customers whitethorn never need them but always pay the bill.Even though there are some laws regarding the disclosure of health and other surreptitious information. But the legal protection of privacy regarding the disclosure of grocery shop habits and other things for example is slim to none in the US. Therefore, you are at the mercy of the self-imposed privacy policies of the individual companies you deal with along with your competency to stay out of those transactional databases in the first place.Within a data warehouse you have two systems in place OLTP and OLAP. OLTP (On-line Transaction Processing) is characterized by a large number of short on-line transactions (INSERT, update and DELETE). The main emphasis for OLTP systems is put on very fast ask processing, maintaining data integrity in multi-access environments and an efficientness measured by number of transactions per second. OLAP (On-line Analytical Processing) is characterized by relatively low volume of transactions. Queries are often very complex and involve aggregations. For OLAP systems a response clock is an effectiveness measure. OLAP natural coverings are widely used by Data dig techniques.A nonher important factor to consider is the use of wrinkle Intelligence. railway line Intelligence or BI is the technology infrastructure for gaining maximum information from available data for the purpose of improving business processes. Typical BI infrastructure components are as follows software solution for gathering, cleansing, integrating, analyzing and sharing data. Business Intelligence produces analysis and provides believable information to help making effective and high quality business decisions.Data crosswise Borders have run short more common and frequent in everyday business. Over the at long last 20 years, patterns of global dataflow have evolved at a rapid one thousand due to developments in global communication networks and business processes. As data is moved from data center to data center and/or across borders, security breaches become a tangible risk.To effectively protect data you must consider its lifecycle. The main features of the data lifecycle areCreate/ apprehend To Receive or create data, whether captured from a website, a file murder or a physical acquisition, go out affect handling. Every method of creation or capture is going to require a unalike form of protection to ensure the information is safeguarded.Index and Classify at once the data has been securely acquired, certain rules must be applied. The first tone of voice is to identify the type of data acquired. Is it personally identifiable information (PII)? Is it an project or a document? What kind of document is it? Categorizing the document pull up stakes make the process mare efficient.Store/Manage Where the data is stored will drive what protection controls are applied. If the data consists of PII or potential PII, then(prenominal) the organization may be legally required to store the data in a disk-based encryption format and encrypt reserve copies of the data. observe/Publish Afte r securely transferring data across the border, enable availability for use by ensuring that data is encrypted at each stage when transferred, stored and displayed. Data cannot be decrypted in countries where it is not being transferred to, and access to systems such as network paths which enable cross-border transfers must be controlled.Process To ensure the data is only used for authorized purposes and in compliance with applicable laws, application controls and metadata tagging are helpful tools.Archive Once Data in not nedded, issues of long-term storage in compliance with the applicable policies and legal requirements arise. Is the backup onsite or offsite? Do your backups cross international borders? Are the backups governed by other countries privacy and data protection laws? The answers to these questions will help ensure that all potential risk areas are mitigated.Destroy Sooner or subsequent data will be deemed unusable, in accordance with applicable legislation. opera te the destruction of archives, files, physical copies and any other copies. However, processes need to be in place for data excluded from regularly scheduled destruction cycles. For example, data reconcile to legal holds and discovery requests, as well as data governed by cross-border privacy legislation.Even with the most robust policies, processes and systems, continuous vigilance is required. Organizations should monitor lizard change to regulatory and security.Referenceshttp//www.howtovanish.com/2009/11/transactional-databases-what-me-worry/http//datawarehouse4u.info/OLTP-vs-OLAP.htmlhttp//datawarehouse4u.info/What-is-Business-Intelligence.htmlhttp//www.globallegalpost.com/commentary/data-across-borders-96787229/

Evolution of Server-side Technologies

Evolution of Server-side TechnologiesChris AvgerinosIntroductionA fundamental change has been occurring for the extend-up the ghost fifteen years in the way plurality write calculating machine programs. Scripting languages such(prenominal) as Perl and Tcl replaced the strategy programming languages such as C and C++. on that point argon tremendous losss between the languages due to the event that scripting languages were designed for completely different tasks than system programming languages. The master(prenominal)(prenominal) operations of system programming languages are for building info structures and algorithms from the beginning employ elements such as words of memory. Scripting languages assume the sets of goodish components and connect them together. concern of complexity is the main use of system programming languages. On the different hand, scripting languages simplify connections between components and provide rapid operation development. (J.Ousterhout, 1998)The main concenter of this paper is the evolution of scripting languages and the improvements on meshing-applications.The history of Scripting LanguageScripting is as darkened as computers due to the concomitant that in order to use a computer you would need scripting. It begun in the 1950s and 60s were programmers subjected punch cards into central processor operators and the machines apply to ran in batch mode. The commencement ceremony scripting language was Job prevail Language (JCL) and while they were truly functional, their response time was very slow. (Delony, 2012)The opinion of scriptable shells came into practice in the 1960s when programmers started developing interactive time-sharing systems. One of the soonest projects was MULTICS and late when some of the Bell Labs programmers left the project, they created a nonher project called UNIX using their own system that they utilise in the MULTICS project. UNIX shells made it possible to do various complex tasks in one crimp of shell grave using the major power to send the output of one program into the input of an some otherwise. (Delony, 2012)In 1987, Larry Wall created Perl which was normal in the 90s for creating web-applications. Languages such as Python and carmine were invented and Python was the main rival of Perl. (Delony, 2012)Application areasIn this section of the paper, we are divergence to categorize these languages in order to analyze them correctly. The four main categories are Command, Application, Markup and cosmopolitan scripting languages.Command scripting languagesThese are the oldest class of scripting languages appearing in 1960 when on that point was a great need for programs and task control double-deckers. As we say before, the most famous of the earliest languages was JCL which was created for IBM OS/360 operating systems. We have overly Sed and Awk which were text-processing languages. These languages were the first to include regular express ion matching and later employ into Perl. (A.Kanavin, 2002)Application scripting languagesThese languages were created in 1980s. Such a language was Microsoft-created Visual sanctioned and later crated its subset Visual basic for application programming. It emphasizes on user interface programming and component embedding. Later on, earlier languages such as newsworthiness Basic and Excel Macro Language were replaced by VBA as the main language for programming Microsoft office suite. Its influence spread and soon VBScript and LotusScript fitting these changes.Table 1 Command Scripting LanguagesIn this class we have as well as JavaScript which is client parts of web-programming projects. This language has a few dialects such as Jscript and it was first introduced in the Netscape Navigator 2.0 browser. (A.Kanavin, 2002)Table 2 Command Scripting LanguagesMarkup LanguagesMarkup languages differ from the other languages due to the fact that they are not programming languages quite a than special command words called tags that markup parts of text documents which later used by programs called processors and had the ability to trans manakin a text so it could be displayed in the browser or converting it to some other data format. The main use of Markup languages is the separation of contents and structures. In addition, they include formatting commands and interactive objects into documents. (A.Kanavin, 2002)In 1969, GML (Generic markup Language) was the first Markup language that was created by IBM. Based on the vagary of GML, ISO created a standard called SGML in 1986. Among the Markup languages, TeX, HTML and XHTML became the most know languages. In 1979, Donald Knuth, created Tex which was essentially designed precise description of how the documents look overlooking the complexity of the structure. This language aim at people who do not necessarily need to know how to program in contrast with Postscript, which was created by Adobe. In the scientific com munity, TeX achieved enormous popularity because it commode fulfil the need for high-quality version of complex formulas.HTML is the basic language of the World Wide Web. It is basically an SGML application.XML is a naiver and streamlined version of SGML which emphasizes on transporting, storing data and exchange data between all kinds of systems. It is used for transforming complex data and hierarchical storing data. HTML was redefined in the terms of XML in 2001 and it was called XHTML. (A.Kanavin, 2002)Table 3 Markup LanguagesUniversal scripting languagesIn this class, we have the languages that are well-know and were originally created for the UNIX environment. However, the goals were very different. The Perl programming language was made for report generation but it became known for its enormous popularity is the ability to write simple and efficient CGI scripts for forming dynamic web pages.First, Python was a tool for accessing system services of the experimental operating system Amoeba but later on, it became an object-oriented scripting language. Applications languages exist that are used by Microsoft.NET platform.Tcl was mainly used as an application extension but it was first created as string processing and close integrating with Tk library. It differs from Perl and Python because it relies on C and C++ extensions. Other languages appeared with web services. PHP is the most popular language and is a combination of HTML and traditional programming procedures. (A.Kanavin, 2002)Table 4 Universal Scripting LanguagesLanguages over affectPythonPython is an object-oriented language which provides high-level data structures. For example, associative arrays, dynamic typing and binding, etcetera Python is a powerful programming language that has a flexible and simple syntax. In 1990, Guido van Rossum created Python and since and then it is free and bathroom be flood on any computer.Python is modular by nature meaning that the core group of Python ca n be extended by importing new extensions. unhomogeneous standard extensions for operations such as script manipulations and Perl-like extensions are include in the Python distribution. muchover, it has Graphical User Interface (GUI) generators, web-related utilities, operating system services, etc. Furthermore, we can create new extensions with new or old inscribe. There has been a remarkable amount of extensions that have been created such as GADFLY, which is an SQL database manager written in Python, PIL the Python imaging library, FNORB, OmniBorker, Numeric Python, etc.(Sanner, 1999)Figure 1 The corpuscle viewer application showing the protein Carmbin (1crn) with its secondary structure shown as a ribbon. The molecular surfaces corresponding to helix1 and sheet2 are displayed and colored using, respectively the RASMOL residue food coloring scheme and the by atom type coloring scheme. Some winding down menus have been torn off to show the commands they provide. This set of c ommands can be extended dynamically by loading modules and commands from libraries.(Sanner, 1999)PerlPerl was created in 1986 by Larry Wall and is basically a combination of C and various UNIX utilities and the whatsis of shell scripting. Some of the languages strength is easily accessing regular expressions, lists, associative arrays, the ability to treat any value as a string, resource heed has become automatic. And if you want to create something, you can do it with many ways. This is called TIMTOWTDI (There Is More Than One Way To Do It).In order to handle complexity, you can use object-orientation. However, some languages force the use of it and usually add unessential complexity to almost all(prenominal) project. To tackle this problem, Perl added support for objects it did so in a way that complex modeling can be achieved if needed.(Chip, n.d.)/usr/ local anaesthetic/bin/perl$ calculate = 0while () w = split$count++for ($i=0 $i$s$i += $w$ifor ($i=0 $i bell ringer $s$i/$co unt, tprint nThis is a simple script that computes the honest of each column in a table of data. It shows one usual usage read in the data and split each line directly to words and store these words in an array. articulateThe say language is designed for symbolic data processing using differential coefficient and integral calculus, electrical circuit theory, mathematical logic, game playing and other various fields of artificial intelligence. Since LISP is mathematical language, it is possible to give a complete description of it. It is different from other languages in ternary ways. First of all, it differs in the nature of the data. S-expressions are data arc in the form of symbolic expressions. Significant sub-expressions can be readily separated due to the fact that S-expressions have indefinite length and a fork-like tree type of structure. The source of the language itself is the second difference from the other languages because it specifies in what way the S-expressio ns are to be processed. The third and final difference of LISP is that it can interpret and execute programs written in the form of S-expressions.(McCarthy, 1965)(defparameter *small* 1)(defparameter *big* 100)(defun guess-my- heel ()(ash (+ *small* *big*) -1))(defun smaller ()(setf *big* (1- (guess-my-number)))(guess-my-number))(defun large ()(setf *small* (1+ (guess-my-number)))(guess-my-number))(defun start-over ()(defparameter *small* 1)(defparameter *big* 100)(guess-my-number))This is a super simple number guessing game. Its also designed to illustrate what its like to work deep down a REPL.Improving Web Application performanceThe need for Client-Side ScriptingNowadays, people expect that web applications function just like a windows application due to the fact that web applications have become more powerful and sophisticated. Basically, web applications reside the source code and assemblies and are processed on a web boniface. What a web server does is that it accepts an in coming HTTP demand and then it returns the requested resource in an HTTP response. (Fote, 2013)The process of submitting an ASP.NET page to the server for processing is called PostBack. The HTML page is sent to the web server every time a PostBack happens. What happens is this the server loads the page, it processes events and renders the new HTML subscribe to the client but on a PostBack the entire page is refreshed. collect to the fact that large web applications consume large amount of view state, it can be very consuming for the client and as a result it will become a major problem for the web server. (Fote, 2013)Inside a clients HTML page, there are embedded scripts which are called Client-Side scripting. What it does is that the code will be processed on the client machine rather than perform a PostBack to the web-server. Moreover, it is basically used for navigating on pages, date validation and formatting and the language that is used is JavaScript which is compatible to any browser. Client-Side scripting has two benefits. The first is that it is very fast and the second is that it requires fewer resources an the web-server. (Fote, 2013)AjaxPart of Ajax is an object called XMLHttpRequest. What Ajax does is that it makes possible the transfer of data between the browser and the server, using XMLHttpRequest API, without having to reload the web page. This object quickly become popular and web applications such as Google acts and Gmail were created using XMLHttpRequest to get new map titles without reloading the page.The requests that Ajax uses, are triggered by JavaScript code. This is what happens your code sends a request to a universal resource locator, and then it receives a response, that triggers a callback function to handle the response. The rest of the code continues to execute while the request is being process due to the fact that the request is asynchronous.(Ajax jQuery Learning Center, n.d.)ConclusionTo conclude, server-side technologie s have been greatly evolved over the years. Languages such as Python, HTML and Perl have raised the standards of scripting languages. Web applications have been ameliorate with the help of Client-Side technologies such as Ajax which played a significant single-valued function in the improvement of web applications. I believe that in the next we will see new languages that will surpass the current languages by far.ReferencesA.Kanavin, An overview of scripting languages (2002) Lappeenranta University of Technology online addressable at http//www.sensi.org/ak/impit/studies/report.pdf Date of Access 25/3/2014Ajax jQuery Learning Center, n.d.Chip, n.d. The ascent of scripting languages. Geeks Are Sexy Technol. News.Delony, D., 2012. Scripting Languages 101 WWW Document. Techopedia.com. URL http//www.techopedia.com/2/28762/development/programming-languages/scripting-languages-101 (accessed 3.12.14).Fote, B., 2013. How Does Client-Side Scripting Improve Web Application Performance? WW W Document. Segue Technol. URL http//www.seguetech.com/blog/2013/02/07/what-are-the-pros-and-cons-of-client-side-scripting (accessed 3.13.14).J.Ousterhout, Scripting Higher Level Programming for the 21st Century (1998) Tcl Developer Xchange online Available at http//www.tcl.tk/doc/scripting.html Date of Access 25/3/2014McCarthy, J., 1965. LISP 1.5 Programmers Manual. MIT Press.Sanner, M.F., 1999. Python a programming language for software integration and development. J Mol Graph Model 17, 5761.

Friday, March 29, 2019

Exploring the depth of Buddhism : four noble truths, Karma, Nirvana

Exploring the depth of Buddhism quaternary terrible the trues, Karma, NirvanaThe Buddhism is the quadth-largest religion in the world, cosmos a rattling powerful religion worldwide. The Buddhism was first originated in India, therefore, being classified as an Indian religion. Although Buddhism originated in India, it rapidly spread around Asia, now being angiotensin-converting enzyme of the just well-nigh dominating and influential religion in Asia. The Buddhism is immensely associated with the asseverate of being wake up intimately the human nature. This process is go fored and trained in general through meditation, which is a distinct feature about Buddhism compargond to other religions. The Buddhism is preferably a self-mentoring and self-recognizing about the nature of human hold ups and the surroundings. The Buddhism encompasses the teachings attributed to Siddhartha Gautama, known as the Buddha, which agent the awakened one. In addition, the Buddha was recogni zed by his followers as an awakened teacher who was fully aw ar of, what is known as the Buddhists philosophy or tactile sensations, a cycle of pang and rebirth. In other words, the Buddhism greatly elaborates on the belief about nothingness, demise and after support.There atomic number 18 various tell apartes in Buddhism but there are two main branches Theravada, meaning the train of elders, and Mahayana, meaning the great vehicle. More everyplace, there are four very big features about Buddhism the four noble law, karma, heaven and Mahayana. The purpose of this paper is to look the Buddhism in depth, about its origins and various beliefs. In particular, it will be found on the four noble equitys, karma, nirvana and Mahayana, the major branches in Buddhism.The most fundamental thoughts and beliefs in Buddhism are greatly based on the four noble truths. Especially in the Mahayana Buddhism, the fourth truths are the essential concepts to the path. The four noble truths ar e the formulation of his understanding of the nature of suffering. Since his beliefs and teachings were largely about suffering and nirvana, it was the most advanced and fundamental principle in Buddhism. The implication of his belief is that he did not view negatively about suffering but acknowledged it. The followings are the four noble truths.1. Life bureau suffering2. The origin of suffering is attachment3. The cessation of suffering is come-at-able4. The path to the cessation of suffering.As the Buddha puts an speech pattern on the understanding of suffering, it is very grave to recognize the importance of these noble truths. The first truth is fundamentally about the human nature being harrowing for their entire lifetime. The rootage of life, birth, is the start of suffering as the pregnancy is extremely painful. As we live along, we age and get older, which is also suffering. Moreover, humans are very conquerable to all kinds of diseases and illness, which is also su ffering. However, on top of all these sufferings, the most painful and long-lasting suffer is probably finish. The death of the parents, friends, lovers and even children jumper cable plenty to great pain for a long time. Therefore, the first noble truth that the life is suffering describes well about the human nature.The second truth suggests that the suffering is caused by attachment. In Buddhist point of attachment is mostly greed, egotism and unnecessary passion. According to this truth, the desire for attachment would only essence in misery and suffer. Moreover, this truth also gives the idea that everything is impermanent, meaning that in any realm of human nature they grassnot possess eternal happiness. Everything changes, death exists and desire will only lead to misery and suffer.The third truth is related to the second truth. Since the suffering is caused by attachment, the cure for suffering is to pilot the attachments. This is simply to abolish the cause of suffer ing, abolishing the source of pain. In other words, by being unfreeze from all worries, troubles and greediness, the cessation of suffering tail be attained. This farming of approximation is called nirvana, which will be dealt in more contingent later on this essay. The nirvana will only be clear to those who extradite attained it.The fourth truth is the extended thought about third truth, which talks about the path to end the suffering, a inactive path of self-improvement. There are two extremes, indulgence and asceticism, which the two ends lead to the end of a cycle, rebirth. Therefore, the main point of this truth is to avoid the extremes in favor of a life of moderation, nonviolence and compassion. Therefore, Buddhism is the middle way.Another central feature about Buddhism is karma, any kind of intentional work on whether mental, verbal, or physical. The karma is every volitional action of persons, whether those are good or bad. The excommunication made in their ca se is because they are delivered from both good and plague they have eradicated ignorance and craving, the roots of Karma. Buddha says All living beings have actions as their own, their inheritance, their immanent cause, their kinsman, their refuge. It is Karma that differentiates beings into low and high shows (deBary, p417). This is the main idea of karma, that the will realizes the difference amongst good and bad. In each life, a soul is punished or rewarded based on its past actions, or karma, from the current life as well as earlier lives. Karma isnt due to gods judgment over a persons behavior. The way Buddhist accepts is somewhat different from the way the ordinary tribe perceive. The Buddhists understand good and evil in terms of how selfless and sodding(a) the person is, rather than simply caring for other people or being nice. Buddhists desire that the greatest achievement is selflessness(deBary, p493), showing how Buddhists perceive goodness. In addition, since ka rma is not a god or a supernatural force, it can be controlled by strong will. This evince of mind, karma, can be recovered(p) by meditation, as the greateset mediation is a mind that lets go(deBary, p495).Another important fact is that Karma is not only believed in Buddhism, but also in Hinduism, Sikhism, Jainism and many other religious groups. Because Karma is categorized as being the set up of cause and effect, Buddhists perceive karma as motives behind an action. Therefore, in order to make a difference between good and bad action, you will mute need to have a pure intention, which can only be obtained in the avoid state.In Buddhism, there is a state that the Buddhists desire to acquire, perhaps their ultimate goal in their lives. When karma is a willful action of individuals, nirvana is the state that Buddhists desire to acquire. Nirvana is the state of being free from all the suffering and sadness. It is a central concept in Buddhism, a spiritual state of having no sorro w and anger. Buddha says that Nirvana is the highest happiness(deBary, p494) , extinguishing ignorance, hate and suffering. The Buddha also referred Nirvana as the state of deathlessness having an increasing control over the generation of karma. Since Buddha had overcome all these complexes and sufferings through meditation and achieved nirvana, his mental health was perfect. Also, that he was very much aware of appreciating the pureness, in which people are initially born with and try to obtain.Therefore, the Buddhists refer to this state as enlightenment. In order to achieve this heartsease, individuals practice and meditate endlessly to empty their minds as much as possible. Also, this highest spiritual state is derived from the cessation of the desires and greed. Once the state of Nirvana is achieved, you can fully escape the cycle of karma and achieve parinirvana, nirvana in the afterlife. Parinirvana is the final nirvana that you at last obtain endless tranquillity in your life for the rest of your cycle of life.The Buddhism relates lots of their religious beliefs to afterlife. For example, they believe that when you commit lots of malevolent actions that you will have to pay get rid of for those actions, perhaps in afterlife. Also, when you are constantly experiencing misfortune, Buddhists will say that you are paying off what you have committed in the past life. Moreover, another(prenominal) famous belief that Buddhists have is that in order to have a relationship with a person, you need have an extremely strong stick with that person from the past life. Meaning that past life and after life is somehow related, in terms of relationships.The Mahayana is one of the two main real branches of Buddhism, which was believed to be first founded in India. It is generally believed in the East Asia, including Korea, Mongolia, china and Japan. The Mahayana is majorly taught in Buddhists schools. People who strongly believe in Mahayana usually cogitate that the state of nirvana can be achieved in a wiz lifetime, and it can be accomplished even by a layperson.The Mahayanists puts an emphasis on the individual enlightenment. In a different point view, they filtrate to liberate from the cycle of birth and death, the ultimate source of suffering. Once Buddhists are set free from all the pain, suffering and troubles, they eventually reach the blessedness of Nirvana. Another important feature about Mahayana is that they believe in universalism, which is the belief that everyone can become a Buddha (deBary, p502). This is an abstract belief but the conjecture is that at some point, you will become a Buddha as you obtain more and more selflessness.Moreover, the Mahayanists also believe that compassion to help animate beings reach enlightenment become a bodhisattva, both human and obviously godlike, yourself. We can see that the Mahayanists generally believed in ordinary people, perhaps Buddhists, could eventually reach a state of mind th at can become Buddha, which can be governed by compassion and individual enlightenment. Once you recognize the sensate beings, you will be drawn closer to the Nirvana, the ideal and ultimate peace in Buddhism. Therefore, the Mahayanists also believe in reaching a state where they could extinguish their own individual existence in Nirvana.In conclusion, we have explored the Buddhism, its various supporting beliefs and the origin of those branches of Buddhism. It seemed that Buddhists majorly desire to achieve the peaceful and empty state of mind, regardless of what branch they strongly believed. For example, there were extremely smashing to acquire the Nirvana, the ultimate peace in life, no longer being entangled in suffering and pain. Most of the suffering comes from the cycle of death and attachment. However, the cessation of those attachments is the way to overcome the pain and achieve nirvana. This controlling of mind is also associated with Karma, which is the willful action. Therefore, the Karma differentiates the state of mind, which will cause the individuals life to branch in different directions. The Mahayana is a powerful branch in Buddhism, which emphasizes individual enlightenment. In a nut shell, the ultimate motto of Buddhism is to achieve the state of nothingness, understanding the cycle of suffering, the karmic cycle and the cycle of rebirth and death. By exploring the Buddhism, I figured that Buddhism is more associated with individuals attainment, rather than simply worshiping the supernatural beings or gods.

The Core Aspects of Marketing

The Core Aspects of trade marketplaceing is the activity, portion of institutions, and coveres for creating, communicating, delivering, and exchanging oblations that accept value for guests, clients, partners, and society at large.Kotler PMarketing is the notice of human activities directed at facilitating and consummating exchanges.CIMThe Chartered Institute of Marketing delineate tradeing as The management process obligated for finding, anticipating and satisfying node requirements advantageably t e genuinely(prenominal)y to my point of view AMA (Ameri lav Marketing Association) says that grocerying is an activity, which an set up does a process identical communicating, delivering, and exchanging offerings to have a valuable customer or clients. correspond to my point of view Kotler P says that marketing is a human activity which facilitates in doing their final activity in exchanging their w bes.According to my point of view CIM (Chartered Institute of Marketing) says that it is a management process which is responsible for identifying and satisfying the customer requirements in truth put onfully.Sm completely history soundly-nigh my selected scheme -LG (Lucky meretricious star)The comp either was originally established in 1958 as Gold star, producing Radios, TVs, Refrigerators, Washing machines, and aureole Conditioners. (LG-MARKETING-Mix) (http//www.docstoc.com/docs/12163409/LG-MARKETING-Mix)According to these three definitions LG is following AMA (Ameri faecal matter Marketing Association) definition. AMA defines as marketing as the institution which does the social helping to the customers. This is what LG is following their of import aim is in addition todoa social service to the public.TASK-1.2Out of the orientations that exist, try to identify to which orientation the disposal belongs to and justify your selection with appropriate examples taken from the shapingOrientationOrientation course persons attitude or adjustment in relation to a special(a) event. (Dictionary)Orientation is a function of the genius involving aw beness of three dimensions sentence, place and person. Problems with orientation lead to disorientation, and whoremaster be due to various conditions, from delirium to intoxication.en.wikipedia.org/wiki/Orientation_(mental) in that location ar four-spot types of orientations those arProduct OrientationSales OrientationMarket Orientation end product OrientationProduct OrientationProduct orientation manner an arranging which principally concentrates on their products to make profits at the a resembling(p) time to fulfill the customers needs. When the output signal process is going on the employees who atomic number 18 functional their leave mainly concentrate on the proper packaging makeup the silk hat prime(prenominal) order.E.g. If we look upon the example, because of the proper packaging order customers lead astound attracted to a incident product they f orget buy it without each hesitation. We lavatory say magi noodles ar lift out examples for that.When a business bases its talent to make profits on the high technical quality of its products, quite than on customer needs. (Lexicon)Sales OrientationSales orientation means an validation which mainly concentrates on their gross revenue on a particular time period akin a year, month and week. In any cheeks their main view allow for be their sales volume their sales terms etc.E.g. If we look upon the example in sales orientation we finish say LGs phone business as a ruff one, because of their hackneyed products large number get attracted they go out buy automatically.Market OrientationMarketing orientation means an organization which mainly concentrates on how to market their product to the customers. In this mode the organization go forth objective a particular mannequinify to increase their profits.E.g. If we look upon the example in market orientation we can sa y Babies be a good localize theme in which we can earn more profits than the another(prenominal) lay group.Production OrientationProduction orientation means an organization which mainly concentrates in the production line. Where they mainly concentrate on the needs and wants of the target market, rather concerning virtually the production techniques etcE.g. If we look upon the example in production orientationLG is following the Market sales orientation method because to spellbind the customers to their selves. They are actually targeting their groups at the same time they are producing unalike products. They are feeling very comfortable with the market orientation method.TASK-1.3 go out how the selected organization is responding to the emerging sore trends and compare the orientations exist in the market place by taking examples.According to LG, impertinent-made trend system is not a tough matter for them because they are perpetually analyzing the customers needs w ants match to their purlieu. LG is an organization which always looks for their opportunities. LG is providing advanced proficient equipments to develop their products according to their latest trends, which is available in the market they are proving that they are market oriented organization. Their new technology has proven that is a big device driver for the new product development development for their existing products. So, their new technological trends are always proving that their ultimate opportunities to the firms to develop their products in a new way.If we consider about new trends that LG organization had followed to satisfy their customer, we can read several new things that they are utilize in their organization. in that location are close to(a) examples for it.LG homework to introduce all new experimental e-paper.In the field of electronic display LG organization is in a high place. Because LG organization is in the field of electronics for nearly 40 year s. They are always trying to do new experiments on new technology items. So, LG have planned to introduce two new experimental methods those are e-papers which will be available in the market in the form of a 19 inch flexible e-papers display a 9.7 inch tinge e-paper display. (LG trends update)LG electronics introduces the globes slimmest OLED 3D TV at IFA 2010LG has designed its new product in concord with 2010 borderless TV series home field of operations system with new colors patterns. According to the LGs display search method, North Americans Blue-ray players market guess is bright in 2009 up to 4.44 million were sold, Blue-ray players expected that it will get sold up to 7.85 million in 2010, but it did not. Because of that they will fall out to increase intensely by 17 million by 2012. In response to this huge growth of Blue-ray market, LG has doubled their sales to 2.5 million which followed from wear years profit of one million sold. LGs ambitious plan is to col lapse 1.2 million Blue-rays players to North America, Which is a largest market in the macrocosm.One of the biggest name calling in the field of consumer electronic products, LG Electronics, has taken the IFA 2010 export system in Berlin, Ger many another(prenominal) they have taken the 3D revolution to new heights. (LG Trends Updates)LG unveils an all new residential solar agency Hybrid Air conditionerNowadays in that respect is a great concern about Green House gases in the atmosphere about the depletion of the ozone layer. Because of the heavy storm many products are get green treatment, especially in the consumer electronics good, where now many companies are introducing extremely energy well organized products which provides 100% reliability to do their best to save the surroundings.(LG Trends Updates)LGs Promoting New Blue-ray Players in USWhats LGs grand plan for promoting their new Blue-ray players? target area the US market.LG Electronics launched their shit new inv entive Blue-ray players of 2010 at the Consumer Electronics attest (CES). LG electronics has strengthened its strategic alliances by developing the enterprise thus they will target the Blue-ray players market. LGs head Kang shin-ik, said that The combination of our technology and partnerships with content-making corporations has paved the way to control over the Blue-ray players market.(digital trends)LG will start the source of power to tower the Blue-ray players in the market of North America Because of the advanced Blue-ray players they can exceed the movies, music, can show heaps of other entertainment, like showing the live on forecast via internet this a great plus for the organization. Furthermore, we can use various contents by simply pressing the shortcut push on. By the net cast method LG is mechanizing the whole content service which are applied to broadband TV, Blue-ray players the home theatre system.LG introduced the Blue-ray system method in the second half o f 2008, which also permitted Netflix contents. We can say that Americas minute one online movie rental website is Netflix. Also LG added YouTube, the worlds popular video website of UCC in the first half of last year their fore all the users can watch the videos in YouTube of the definition of Blue-ray players. As a result LG is providing some usefulness to the customers, where can watch more than 12,000 high-quality movies, TV programs UCC videos etc This technology method will get uploaded by 13 hours capa city where in their birth living room or bedroom. What we have to do is just to chaffer the Blue-ray player it will do all the work for you. LG is further expanding their Blue-ray network. They will expand their Blue-ray system to a higher level thus in the near future.LG is tempting to the Blue-ray player, which is connected to the internet other multimedia devices much(prenominal) as Wi-Fi Digital Living Network Alliance (DLNA). Through this method users can use the net work by their PCs they can use to escape movies other files. (Digital Trends)Conclusion-In my point of view I would say that always LG is mournful to the new trends, because to invent new technologies other items. Their main is to satisfy the customers by their wants according to their environmental culture.TASK-1.4In your view point explain the cost and bring ins of the marketing approach of the selected organizationIf we trance upon this topic this is an interesting exiting topic.Cost benefit of an organization plays a major role in an organization. Cost means how much amount that is paid to purchase a product benefit means how much advantage we too ked from that product. For this physical process organization is using lots of method to increase their benefits.When we are considering about LGs cost benefits procedure they are using different kind of cost techniques at the same time they are also getting the benefits too.If we buy a liquid crystal display TV in LG in the big size like 32 inches more we can have a small home theatre system for free.If we buy any high rated product from LG the employees who are work will give a good service to the buyer like taking their product keeping in their vehicle.There are providing best facilities for their customers. Facilities like Air conditioning the full place it means keeping the entire place cool allowing the customers to park their vehiclesThey are using some new technologies communication method like hoarding, posters, banners other methods to grab the attention of the customers.If we see upon the benefits LG organization is providing to the customers giving special discounts in the festival time.In the above form there are some costs benefits which are provided by LG.The Awards which LG gotIf we see upon the lay outs which LG has achieved, we can say many things like LG got the award for the innovative organization for their creative thoughts in the years of 1989-1994. LG got the green products award in 2009 for their step towards better environment. LG got an award of CES wireless handset which is for the electronics. exchangeable this LG organization has got many awards.Customer SatisfactionIf we see upon the customer triumph level in LG its really good, because all the employees who are on the job(p) in LG satisfying the customer needs perfectly according to their requirements. For the second full-strength year, LG has got the highest rank in customer satisfaction with the clothes washers dryers according to the J.D Powers method.Market fateLG is a worldwide order where moreover employees are working(a) to satisfy the customers. LG has a biggest market share in the world. If we see upon the market share of LG it is having about 65% in the worldStrong brand nameIf we see upon the LG it is a reputed international firm which has a diversify product line in the electronics field, so LG has a cockeyed pecuniary moorage which is big strength for the firm. Conclusion- In my point of view I would say that LG is charging only few of money, but they are giving lots of benefits to customers. They are getting more awards for their creativeness, satisfying the customers in a best way, keeping a good market share in the world having a strong brand name in the world.TASK-2.1The macro and small environmental mover influences of the selected organization marketing activities. big EnvironmentMacro environment means the external ciphers which will scratch a companys planning and their performance which are beyond their control.Micro EnvironmentMicro environment is an environment which covers a small area of a particular organization. This studies about the individuals, household and firms that make decisions to all to allocate the limited resources, where goods services are being bought sold. In the micro environment there will be customers, competitors, suppliers the public (marketing Mimi.hu)Macro Micro environment in LGThis is the envi ronment which nub the organization externally. By analyzing this environment you can get the opportunity cancel the threads.Macro environmentPolitical factorEconomic factorSocio-cultural factorTechnological factorPolitical work outIf we see upon the political factor there is being a major issue in Pakistan. There political conditions have made industry very unstable. Because of that issue all the other LG firms around the world are getting affected.Economic FactorIf we see upon the economic factor Gross Domestic Product (GDP) is an central thing to any organization. If the GDP is high then the disposal income will be high at the same time spending power will also increase. So, we have to mainly consider on the swelling method because if the inflation increases products prices will increase this will affect the customers buy pattern, but if the inflation decreases products prices will go down this will serving the customers to buy more products at the same time. So we should carefully travelling bag these problems.Socio-Cultural FactorLG is a company which originated from Korea according to that other countries adapted Koreas culture. There are social forms of society which contain of Upper shape, middle tell apart lower clan. Every country has cultural standards, values, beliefs and religion which can affect the organization.Technological FactorNowadays we can see that technology is improve a lot. Due to the new technologies internet, communication system other methods are introduced. Because of these technologies people are getting more benefits like sending the messages very quickly by internet, speaking to their relatives other well-known people who are in abroad. Because of the improvement of new technologies LGs products became cheaper their quality of product has been increased.Micro environment of LGEmployeesThe number of employees of LG electronics stood at approximately 82,000 at the end of 2007. Many of the people are working overse as in the LGs firm. The people who are working in overseas should try to increase the localization strategy. In the world 16% of female employees are working as total interior(prenominal) workforce. The average of the total male female workforce is 33.8 years entirely 0.8% of the disabled people are working in the total workforce. (Market share of LG)SuppliersIn the LG firm all the management people are well skilled they are keeping a good relationship with the other members. LG is a sufficient organization so they always go to the qualified suppliers. In this all the suppliers are from different countries like China, Italy, France, Japan USA, So supplier is a main part in an organization. LG is getting the publish products from Abans.CustomersLG is a worldwide organization, so according to the brand name many customers will come to buy the product to satisfy their needs wants. LGs products are most probably suites for the people who are interested in the product.Competitors In every field we can see there is a big competition among the organizations. If we see upon the competitors in LG there are many of them. We can say Samsung, Sony, Singer, Whirlpool many companies for the competitors.ManagementManagers are the people who are responsible for the managerial work. So, Managers role is very Copernican to any organization. If we see upon the LG management it is very good in solving its risks. LGs managers are very helpful to the customers, because if there any problem occurs managers will try to ascertain the customers problem theyll try to solve it.Conclusion- In my point of view I would say that LGs macro micro factors are really helpful to the employees who are working their to the customers who are coming to buy the product.TASK-2.2Identify and explain the cleavage criteria used in the domestic marketing approach (both B2C and B2B) divisionSegmentation means a company which operates in a broader market to target a group of customers with their specific characteristics. In segmentation we cannot satisfy all the customers needs at the same time, because all the customers purchasing pattern will be varied in according to their requirements.There are four types of segmentation criteriasThose areGeo graphic SegmentationDemographical SegmentationPsycho graphical Segmentation behavioural SegmentationMarket segmentation of LG is very easy easy to understand.GeographicIf we see upon the LG firm in the region heady they have it in different countries. They are following this method to fix the market all around the world.If we see upon the LG firm in the city wise they have the companies 80 km distance another company to keep up the team sprit among the members.DemographicSecond base is the demographic segmentation method where it will mainly consider about the income level. If the organization is targeting a higher class company LGs segment will be consumers with high income levels.PsychographicThird base is the psychographic segmentation method where it will considers about the classes like upper class, middle class the lower class. Psychographics includes some variables those areActivities- If we look upon the activities which are LG is currently doing we can say many things like LG doing after sales service to the customers other activities.Interests-If we see upon the interests that an LG person has, to score new things like creating a new technology item into the market.BehavioralBehavioral is another method in which where the firm will mainly consider about buyers behavior. In this method the organization will give lots of benefits to the customers like giving the products in a good quality one.Conclusion-In my point of view I would say that segmentation means a company which will have a broader market targets a group of customers who will have the specific characteristics. These four criterias are helping the organization to be in a good position.TASK-2.3Outline the factors which influence th e extract of targeting strategy for the selected organization.TargetingLG has targeted the market on the basis of the product that they are offering to the customer they are also targeting the consumers who are more concerned on their safety health issues.They are TargetingUpper class segment-Targeting the upper class people who will buy more of the product.Upper end-Targeting the middle class people who will buy a some of product.They are also targeting those consumers who are taking more concern about their life modality product. Because LG is a world class company all the consumers are view that they need quality products. LG Company is having the LCD plasma television the TV DIOS refrigerator for the premier segment. LG is now going to shift from middle class segment they are moving their product to the mass market.Basis of selecting the Target MarketBasis of selecting valuable customers, that means selecting the best customers who are buying their products at LG without looking their costs. LG organization is targeting people like this to earn the profit at the same time to give a good service to the customers.Conclusion-TASK-2.4Explain the activities undertaken by the organization to influence the buyer decision process and based on your findings explain the organizational and business buyer behavioral characteristics affecting the selected organization.TASK-3.1Analyze the different product/ services offered by the organization and explain how the products and services are developed in order to achieve a competitive advantage.ProductIf we see upon the product it is the main important function in the 4ps. LG is striving to get ahead the market leadership position so they have thought to bring new innovative products to the market. To gain the market leadership position they are introducing new products to the market like the Quadoor refrigerator other new products. If we see the products in LG they have categorise into four that is Digital Ap pliance, Digital Display, Digital Media, Mobial communication. In this four types we can see which product is in which category, the products are showed belowDigital appliance- Air conditioner, Refrigerator, washing machines, vacuum cleaner, Microwave ovens etc.Digital Display- TVs, Monitors, video tapes, DVD-R Disc etcDigital media- Optical storage, Audio, notebook, PC, DVD player etc..Mobial communication- Mobial telecommunication, WLL handsets, Telecommunication systems etcIn this four category we can see all the products which are available in LG. we can always expect that the products quality will be good at the same time we can say that that the products will be in the latest technology.TASK-3.2What are the distribution channels used by the organization in order to increase the customer convenience and evaluate it. currently LG is using the distribution channel of Pak Electron (Pvt.) Ltd. that is veryintensive and strong distribution channel that enables company to make its p roducts availablecompany wide. So there is strong distribution network owned by LG. (LG Quadoor)According to the places of LG it has many outlets in Sri LankaDistribution channels-Teleseen marketing